Chris Christensen Northern Kentucky University. B.A. in mathematics from Columbia in 1911. Masters degree 1913. Ph.D. from Yale in 1926. 1916 joined US.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Convolutional Codes Mohammad Hanaysheh Mahdi Barhoush.
Cryptography encryption authentication digital signatures
Chapter 6 Computer Assisted Audit Tools and Techniques
College of Information Technology & Design
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
ITEC 352 Lecture 34 Communications. Review USB –How did you like the material (1-10) from bad to good –What did you learn? Differences between bus types.
Applied Algorithmics - week7
Error Control Code.
Chapter 4 Systems of Linear Equations; Matrices
Chapter 4 Systems of Linear Equations; Matrices
Describing Process Specifications and Structured Decisions Systems Analysis and Design, 7e Kendall & Kendall 9 © 2008 Pearson Prentice Hall.
Math for Liberal Studies.  Problems can occur when data is transmitted from one place to another  The two main problems are  transmission errors: the.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Process Specifications and Structured Decisions Systems Analysis and Design, 8e Kendall.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Statistical Treatment of Data Significant Figures : number of digits know with certainty + the first in doubt. Rounding off: use the same number of significant.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
The Mathematics of Star Trek Data Transmission Michael A. Karls Ball State University.
Hamming Code A Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect up to two bit errors,
Hamming It Up with Hamming Codes CSE 461 Section Week 3.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
Mathematics in Management Science
The Mathematics of Star Trek
Encryption: A Brief History Author: Margery Waldron.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Problem Solving Techniques. Compiler n Is a computer program whose purpose is to take a description of a desired program coded in a programming language.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
CS717 Algorithm-Based Fault Tolerance Matrix Multiplication Greg Bronevetsky.
DIGITAL COMMUNICATIONS Linear Block Codes
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Basic Concepts of Encoding Codes and Error Correction 1.
Error Detection and Correction – Hamming Code
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Shahram Khazaei Siavash Ahmadi Fall 2015
Cryptography and Coding Theory
I.S 512 TOPIC 1 COMMUNICATIONS AND NETWORKS. DEFINING COMMUNICATION Communication refers to a process whereby a signal is transmitted from a sender to.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Hamming (4,7) Code Binary Linear Codes Hamming Distance Weight of BLC
Copyright © 2011 Pearson Education Process Specifications and Structured Decisions Systems Analysis and Design, 8e Kendall & Kendall Global Edition 9.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
RS – Reed Solomon Error correcting code. Error-correcting codes are clever ways of representing data so that one can recover the original information.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Cryptography.
Digital Signatures…!.
DISSERTATION ON CRYPTOGRAPHY.
Digital Communications
Error Detection and Correction
Basic of Modern Cryptography
Error Detection and Correction
Presentation transcript:

Chris Christensen Northern Kentucky University

B.A. in mathematics from Columbia in Masters degree Ph.D. from Yale in joined US Navy Reserves and served in World War I as a LT (j.g.)

Hill joined the faculty at Hunter College in Taught at the Army University in Biarritz, France in Hill remained at Hunter until his retirement due to illness in Hill died in 1961.

David Kahn met with Hills widow after Hills death and collected papers of Hills that were laying around the house. Those papers are now at the National Cryptologic Museum library.

1929 Cryptography in an algebraic alphabet 1931 Concerning certain linear transformation apparatus of cryptography

Monoalphabetic substitutionPolygraphic substitution

Reference The keyspace of the Hill cipher by Overby, Traves, and Wojdylo in Cryptologia, x4 key

Its LINEAR.

Solution is NP-hard.

Amount $128 Check number 586 Date December 26, 1928

Data from a check Amount $ Check number Date December 26, Data from a chart

Input is 6 numbers between 00 and ^6 = 1,061,520,150,601 Output is 3 numbers between 00 and ^3 = 1,030,301

In 1926 and 1927, while he was a Ph.D. student at Yale, Hill published three papers in Telegraph and Telephone Age which describe a checking scheme. He hoped to make some money from his checking scheme, which he was seeking to have patented. This did not go anywhere, but it sparked his interest in secret communications. David Kahn

Briefly stated, what I now have in mind – and have not noticed hitherto – is that, if my checking procedure were applied generally, it would be very easy to make the telephone (long distance) take over effectively, in a novel way, a goodly portion of the present domestic telegraph business.

We are not interested in the origin or significance of the component parts of the number, nor in the method of transmittal. Thus, 7405 might be a sum of money, and a combination of testing figures compounded from the initials to whom the money is being sent and from other elements; might refer to an entry in some code book or other volume, etc. The entire number may be sent as it stands, or by means of code and cipher. Our object here is merely to supply a check upon the accurate transmittal.

The nine-digit message is checked by the sequence The sender send the message appended by the check The receiver calculates the check string from the received message string and compares it to the received check string. If the two check strings are the same, it is assumed that the message was transmitted without error.

All error detecting codes require some repetition of message information. The goal is to minimize the amount of repetition.

Error detecting codes The history of error detecting codes is not clear. Claude Shannon (1948) Richard Hamming (1948) Marcel Golay (1949) Error correcting codes

It is not clear from Hills Telegraph and Telephone Age papers whether he understood that the method he was describing was matrix multiplication. The checking of the accuracy of transmittal of telegraphic communications by means of operations in finite fields Undated; in the David Kahn collection.

My correspondent will be absolutely sure that he has precisely the message which I sent him, or absolutely sure that a mistake is present. … And nobody in the world except my correspondent can possibly decipher the meaning of my message. Moreover, my correspondent will be deadly sure, if the message checks, that message was sent by me and nobody else in the world. If this message checks, … correspondent can accept it as having all of my authority behind it.

Secret communications. Integrity. Authentication and non-repudiation.